首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
68
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
①
选项
A、different
B、same
C、public
D、private
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/2F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
地方政府在拍卖土地时,有一个基本的价格,叫作“土地基价”;拍卖所得超出土地基价的金额与土地基价之比,叫作“溢价率”。溢价率的高低标志着土地市场和楼市的热度。B市有一块地,在今年第一次上市过程中,因溢价率将创新高而被临时叫停。第二次上市最终以低于第一次上市的
某学校规定:除非学生成绩优秀并且品德良好,否则不能获得奖学金。以下各项都符合该学校的规定,除了:
论证有效性分析:分析下述论证中存在的缺陷和漏洞,选择若干要点,写一篇600字左右的文章,对该论证的有效性进行分析和评论。(论证有效性分析的一般要点是:概念特别是核心概念的界定和使用是否准确并前后一致,有无各种明显的逻辑错误,论证的论据是否成立并支持结论,结
已知(x2+px+8)(x2-3x+q)的展开式中不含x2,x3项,则p,q的值为()。
从6名男生和4名女生中,选出3名代表,要求至少包含1名女生,则不同的选法有()。
学校要选派4名爱好摄影的同学中的3名分别参加校外摄影小组的3期培训(每期只派1名),甲、乙两位同学都不能参加第1期培训,不同的选派方式共有()。
在初步探索社会主义建设道路的过程中,毛泽东提出了以农业为基础,以工业为主导,以重轻农为序发展国民经济的总方针。
1934年10月中旬,中共中央机关和中央红军撤离根据地,开始长征。在占领黔北重镇遵义之后。中共中央政治局于1935年1月15日至17日召开了扩大会议(史称遵义会议)。下列关于遵义会议的表述,错误的是()
中国古代的思想家大都认为,在塑造理想人格的过程中,最重要的就是要奋发向上、切磋践履、修身养性。一个社会的道德规范和道德原则确立之后,最重要的就是要使这些道德原则和道德规范能够转化成人们的思想品德和行为实践,养成良好的道德习惯,形成完善的道德人格。儒家经典《
网络管理员监测到局域网内计算机的传输速度变得很慢,可能造成该故障的原因有________。①网络线路介质故障②计算机网卡故障③蠕虫病毒④WannaCry勒索病毒⑤运营商互联网接入故障⑥网络广播风暴
随机试题
青年男性,阴囊肿大,摸到睾丸。透光试验阳性。可能是老年男性,腹股沟内侧半球肿物,平卧消失,压住内环,肿块仍可复出。可能是
正确处理医务人员之间关系的思想基础是
至2013年末,安徽芜湖市下辖无为、芜湖、繁昌、南陵四县和镜湖、弋江、鸩江、三山四区,拥有()个国家级开发区和()个省级开发区。
以下对依法治校的认识错误的是()。
下里巴人:通俗
仓库里原有一批存货,以后继续运货进仓,且每天运进的一样多。用同样的汽车运货出仓,如果每天用4辆汽车运,那么9天恰好运完;如果每天用5辆汽车运,那么6天恰好运完。仓库里原有货物若用1辆汽车运,则需要多少天运完?
设α1,α2,α3,β1,β2都是四维列向量,且|A|=|α1,α2,α3,β1|=m,|B|=|α1,α2,β2,α3|=n,则|α3,α2,α1,β1+β2|为().
Dopeoplegethappierormorefoul-temperedastheyage?Stereotypesofirritableneighbors【C1】______,scientistshavebeentryi
在设备管理中,为了克服独占设备速度较慢,降低设备资源利用率的缺点,引入了【】,即用共享设备模拟独占设备。
OneofthesaddestthingsabouttheperiodinwhichweliveisthegrowingestrangementbetweenAmericaandEurope.Thismaybe
最新回复
(
0
)